Author name: Mike M.

two-giants-in-the-satellite-telecom-industry-join-forces-to-counter-starlink

Two giants in the satellite telecom industry join forces to counter Starlink

M&A —

SES is buying Intelsat, the world’s first commercial satellite operator, for $3.1 billion.

The Intelsat 901 satellite is seen by a Northrop Grumman servicing vehicle in 2020.

Enlarge / The Intelsat 901 satellite is seen by a Northrop Grumman servicing vehicle in 2020.

Facing competition from Starlink and other emerging satellite broadband networks, the two companies that own most of the traditional commercial communications spacecraft in geostationary orbit announced plans to join forces Tuesday.

SES, based in Luxembourg, will buy Intelsat for $3.1 billion. The acquisition will create a combined company boasting a fleet of some 100 multi-ton satellites in geostationary orbit, a ring of spacecraft located more than 22,000 miles (nearly 36,000 kilometers) over the equator. This will be more than twice the size of the fleet of the next-largest commercial geostationary satellite operator.

The problem is that demand is waning for communication services through large geostationary (GEO) satellites. There are some large entrenched customers, like video media companies and the military, that will continue to buy telecom capacity on geostationary satellites. But there’s a growing demand among consumers, and some segments of the corporate and government markets, for the types of services offered by constellations of smaller satellites flying closer to Earth.

The biggest of these constellations, by far, is SpaceX’s Starlink network, with more than 5,800 active satellites in its low-Earth orbit fleet a few hundred miles above Earth. Each of the Starlink satellites is smaller than a conventional geostationary platform, but linked together with laser communication terminals, thousands of these spacecraft pack enough punch to eclipse the capacity of internet networks anchored by geostationary satellites. Starlink now has more than 2.6 million subscribers, according to SpaceX.

Satellites in low-Earth orbit (LEO) offer some advantages over geostationary satellites. Because they are closer to users on the ground, low-Earth orbit satellites provide signals with lower latency. The satellites for these constellations can be mass-produced at relatively low cost, compared to a single geostationary satellite, which often costs $250 million or more to build and launch.

“In a fast-moving and competitive satellite communication industry, this transaction expands our multi-orbit space network, spectrum portfolio, ground infrastructure around the world, go-to-market capabilities, managed service solutions, and financial profile,” said Adel Al-Saleh, CEO of SES, in a statement announcing the acquisition of Intelsat.

A trend of consolidation

Some of the largest legacy operators in geostationary orbit have made moves over the last decade to respond to the new competition.

The only operational low-Earth orbit internet constellation besides Starlink was launched by OneWeb, which primarily sells capacity to existing internet providers, who then distribute services to individual consumers. This is in contrast to SpaceX’s approach with Starlink providing services direct to homes and businesses.

Eutelsat, the third-largest operator of geostationary satellites, merged with OneWeb last year, creating a company with a blended offering of GEO and LEO services. Viasat, a pioneer in satellite internet services using dedicated spacecraft in geostationary orbit, last year purchased Inmarsat, which specialized in providing connectivity to airplanes and ships.

SES’s acquisition of Intelsat stands apart due to the size of their satellite fleets. Founded in 1985, SES currently operates 43 geostationary satellites, plus 26 broadband spacecraft in medium-Earth orbit (MEO) a few thousand miles above Earth. These MEO satellites operate in a kind of middle ground between LEO and GEO satellites, offering lower-latency than geostationary networks, while still flying high enough to not require hundreds or thousands of spacecraft to blanket the globe.

Intelsat has 57 geostationary satellites, primarily for television and video relay services. Al-Saleh said the combined company will offer coverage over 99 percent of the world, and provide services through a range of communication bands. For now, LEO broadband satellites in the Starlink and OneWeb networks beam signals to user terminals in Ku-band.

Al-Saleh said the combined networks of SES and Intelsat will span Ka-band, Ku-band, X-band, C-band, UHF, and secure bands tailored for military use. “That gives us a unique position in the market place to be able to deliver to our clients,” he said.

SES and Intelsat have 13 new satellites on order, including six GEO spacecraft and seven broadband MEO satellites. Intelsat also brings to the table access to OneWeb’s LEO constellation. Earlier this year, Intelsat announced it reserved $250 million of capacity on OneWeb’s network over the next six years, with an option to purchase double that amount.

This illustration shows the relative locations of satellites in geostationary orbit, medium-Earth orbit, and low-Earth orbit.

Enlarge / This illustration shows the relative locations of satellites in geostationary orbit, medium-Earth orbit, and low-Earth orbit.

“We will create a stronger expanded network capabilities that are multi-orbit,” Al-Saleh said in an earnings call Tuesday. “We are not just a GEO player. We are an all-orbit player.”

Internet signals coming from a GEO satellite, like a Viasat spacecraft, typically have a latency of about 600 milliseconds. Al-Saleh said SES’s O3b network in medium-Earth orbit provides signals with a latency of about 120 milliseconds. According to SpaceX, Starlink latency ranges between 25 and 60 milliseconds.

A satellite pioneer

Intelsat has a storied history. Founded in 1964 as an intergovernmental organization, Intelsat operated the first commercial communications satellite in geostationary orbit. It became a private company in 2001, then went public in 2013 before filing for bankruptcy in 2020. Intelsat emerged from bankruptcy proceedings as a private company in 2022.

“Over the past two years, the Intelsat team has executed a remarkable strategic reset,” said David Wajsgras, CEO of Intelsat, in a statement. “We have reversed a 10-year negative trend to return to growth, established a new and game-changing technology roadmap, and focused on productivity and execution to deliver competitive capabilities.”

SES and Intelsat expect the acquisition to close in the second half of 2025, pending regulatory approvals. The boards of both companies unanimously approved the transaction.

Both companies maintain hundreds of millions of dollars of business with the US government each year, and the military’s appetite for commercial satellite communications is going up. “I think many of the satellite players are seeing the benefit of that, not just us,” Al-Saleh said. “You can look at our competitors. You can look at Starlink. You can look at others. We’re all seeing an uptick in demand.”

Al-Saleh said he doesn’t foresee any roadblocks from the Pentagon or any government regulators before closing the transaction next year.

SES and Intelsat revealed last year there were in talks to combine. According to Al-Saleh, SES looked at multiple opportunities for mergers or acquisitions to make use of a multibillion-dollar windfall from the Federal Communications Commission tied to the auction of C-band satellite spectrum for cellular networks.

“It was clear to us that this particular transaction, if we’re able to successfully close it with the right type of value, is the most compelling proposition we had on the table,” he said.

Two giants in the satellite telecom industry join forces to counter Starlink Read More »

here’s-your-chance-to-own-a-decommissioned-us-government-supercomputer

Here’s your chance to own a decommissioned US government supercomputer

But can it run Crysis —

145,152-core Cheyenne supercomputer was 20th most powerful in the world in 2016.

A photo of the Cheyenne supercomputer, which is now up for auction.

Enlarge / A photo of the Cheyenne supercomputer, which is now up for auction.

On Tuesday, the US General Services Administration began an auction for the decommissioned Cheyenne supercomputer, located in Cheyenne, Wyoming. The 5.34-petaflop supercomputer ranked as the 20th most powerful in the world at the time of its installation in 2016. Bidding started at $2,500, but it’s price is currently $27,643 with the reserve not yet met.

The supercomputer, which officially operated between January 12, 2017, and December 31, 2023, at the NCAR-Wyoming Supercomputing Center, was a powerful (and once considered energy-efficient) system that significantly advanced atmospheric and Earth system sciences research.

“In its lifetime, Cheyenne delivered over 7 billion core-hours, served over 4,400 users, and supported nearly 1,300 NSF awards,” writes the University Corporation for Atmospheric Research (UCAR) on its official Cheyenne information page. “It played a key role in education, supporting more than 80 university courses and training events. Nearly 1,000 projects were awarded for early-career graduate students and postdocs. Perhaps most tellingly, Cheyenne-powered research generated over 4,500 peer-review publications, dissertations and theses, and other works.”

UCAR says that Cheynne was originally slated to be replaced after five years, but the COVID-19 pandemic severely disrupted supply chains, and it clocked in two extra years in its tour of duty. The auction page says that Cheyenne recently experienced maintenance limitations due to faulty quick disconnects in its cooling system. As a result, approximately 1 percent of the compute nodes have failed, primarily due to ECC errors in the DIMMs. Given the expense and downtime associated with repairs, the decision was made to auction off the components.

  • A photo gallery of the Cheyenne supercomputer up for auction.

With a peak performance of 5,340 teraflops (4,788 Linpack teraflops), this SGI ICE XA system was capable of performing over 3 billion calculations per second for every watt of energy consumed, making it three times more energy-efficient than its predecessor, Yellowstone. The system featured 4,032 dual-socket nodes, each with two 18-core, 2.3-GHz Intel Xeon E5-2697v4 processors, for a total of 145,152 CPU cores. It also included 313 terabytes of memory and 40 petabytes of storage. The entire system in operation consumed about 1.7 megawatts of power.

Just to compare, the world’s top-rated supercomputer at the moment—Frontier at Oak Ridge National Labs in Tennessee—features a theoretical peak performance of 1,679.82 petaflops, includes 8,699,904 CPU cores, and uses 22.7 megawatts of power.

The GSA notes that potential buyers of Cheyenne should be aware that professional movers with appropriate equipment will be required to handle the heavy racks and components. The auction includes seven E-Cell pairs (14 total), each with a cooling distribution unit (CDU). Each E-Cell weighs approximately 1,500 lbs. Additionally, the auction features two air-cooled Cheyenne Management Racks, each weighing 2,500 lbs, that contain servers, switches, and power units.

As of this writing, 12 potential buyers have bid on this computing monster so far. The auction closes on May 5 at 6: 11 pm Central Time if you’re interested in bidding. But don’t get too excited by photos of the extensive cabling: As the auction site notes, “fiber optic and CAT5/6 cabling are excluded from the resale package.”

Here’s your chance to own a decommissioned US government supercomputer Read More »

the-iphone’s-next-aaa-game,-assassin’s-creed-mirage,-gets-a-release-date

The iPhone’s next AAA game, Assassin’s Creed Mirage, gets a release date

Leap of faith —

The game launched on consoles and PC months ago.

An Assassin stands over the city of Baghdad

Enlarge / Assassin’s Creed Mirage returned to the earlier games’ focus on stealth assassinations in a historical urban environment.

Ubisoft

Apple has spent the last year trying to convince gamers that they can get a console-like, triple-A experience on the latest iPhones. The newest test of that promise will be Ubisoft’s Assassin’s Creed Mirage, which now has a release date and pricing information.

Mirage will land on compatible iPhones—the iPhone 15, iPhone 15 Plus, iPhone 15 Pro, and iPhone 15 Pro Max—on June 6, according to Ubisoft (though the App Store listing says June 10.) That coincides pretty closely with Apple’s annual developer conference, so we’d expect it to get a shoutout there. Ubisoft’s blog post also says it will come to the iPad Air and iPad Pro models with an M1 chip or later.

The game will be a free download with a 90-minute free trial. After that, you’ll have to pay $50 to keep playing, which is pretty close to what the game costs on PC and consoles. It will support cross-progression, provided you sign into Ubisoft Connect. Ubisoft Connect is not exactly beloved by players, but it’s nice to be able to take your saves back and forth between other platforms if you can stomach it.

That cross-progression feature is key because the game launched several months ago on other platforms, so players interested in it probably already have made some progress in the story, if they haven’t finished it already.

Mirage is well over a dozen mainline games into the franchise, but it’s a smaller, more focused game than 2018’s Odyssey or 2020’s Valhalla. While those games expanded the franchise away from its stealth roots to become more of a full-fledged The Witcher 3-like open-world RPG experience, Mirage goes back to the old style of gameplay. It originally started as DLC for Valhalla but was expanded into a full game.

It won’t be the first triple-A game to hit the iPhone 15 and later, though the list has been short so far. A couple of Resident Evil games have made their way to phones (Resident Evil 4‘s remake and Resident Evil Village), and Apple has also managed to get respectable ports of No Man’s Sky, Death Stranding, and Baldur’s Gate 3 to Apple Silicon Macs.

When we tested the Resident Evil titles on the iPhone 15, we found that the graphics and performance were quite respectable—perhaps comparable to what you’d get on a PlayStation 4 Pro, a mid-range gaming laptop, or a Steam Deck—but that the touch controls never seem to cut it, so you’ll want to use a controller. iOS supports the latest PlayStation, Xbox, and Nintendo controllers, as well as attachable controllers like the Razer Kishi. Mirage will also support those controllers.

The iPhone’s next AAA game, Assassin’s Creed Mirage, gets a release date Read More »

dea-to-reclassify-marijuana-as-a-lower-risk-drug,-reports-say

DEA to reclassify marijuana as a lower-risk drug, reports say

downgrade —

Marijuana to move from Schedule 1, the most dangerous drug group, to Schedule 3.

Medical marijuana growing in a facility in Canada.

Enlarge / Medical marijuana growing in a facility in Canada.

The US Drug Enforcement Administration is preparing to reclassify marijuana to a lower-risk drug category, a major federal policy change that is in line with recommendations from the US health department last year. The upcoming move was first reported by the Associated Press on Tuesday afternoon and has since been confirmed by several other outlets.

The DEA currently designates marijuana as a Schedule 1 drug, defined as drugs “with no currently accepted medical use and a high potential for abuse.” It puts marijuana in league with LSD and heroin. According to the reports today, the DEA is moving to reclassify it as a Schedule 3 drug, defined as having “a moderate to low potential for physical and psychological dependence.” The move would place marijuana in the ranks of ketamine, testosterone, and products containing less than 90 milligrams of codeine.

Marijuana’s rescheduling would be a nod to its potential medical benefits and would shift federal policy in line with many states. To date, 38 states have already legalized medical marijuana.

In August, the Department of Health and Human Services advised the DEA to move marijuana from Schedule 1 to Schedule 3 based on a review of data by the Food and Drug Administration. The recommendation came after the FDA, in August, granted the first approval of a marijuana-based drug. The drug, Epidiolex (cannabidiol), is approved to treat rare and severe forms of epilepsy. The approval was expected to spur the DEA to downgrade marijuana’s scheduling, though some had predicted it would have occurred earlier. Independent expert advisors for the FDA voted unanimously in favor of approval, convinced by data from three high-quality clinical trials that indicated benefits and a “negligible abuse potential.”

The shift may have a limited effect on consumers in states that have already eased access to marijuana. In addition to the 38 states with medical marijuana access, 24 states have legalized recreational use. But, as a Schedule 3 drug, marijuana would still be regulated by the DEA. The Associated Press notes that the rule change means that roughly 15,000 dispensaries would need to register with the DEA, much like pharmacies, and follow strict reporting requirements.

One area that will clearly benefit from the change is scientific research on marijuana’s effects. Many academic scientists are federally funded and, as such, they must follow federal regulations. Researching a Schedule 1 drug carries extensive restrictions and rules, even for researchers in states where marijuana is legalized. A lower scheduling will allow researchers better access to conduct long-awaited studies.

It’s unclear exactly when the move will be announced and finalized. The DEA must get sign-off from the White House Office of Management and Budget (OMB) before proceeding. A source for NBC News said Attorney General Merrick Garland may submit the rescheduling to the OMB as early as Tuesday afternoon. After that, the DEA will open a public comment period before it can finalize the rule.

The US Department of Justice told several outlets that it “continues to work on this rule. We have no further comment at this time.”

DEA to reclassify marijuana as a lower-risk drug, reports say Read More »

binance’s-billionaire-founder-gets-4-months-for-violating-money-laundering-law

Binance’s billionaire founder gets 4 months for violating money laundering law

Binance founder sentencing —

US prosecutors sought 3-year sentence for Binance founder Changpeng Zhao.

Former Binance CEO Changpeng Zhao walking outside a court house.

Enlarge / Former Binance CEO Changpeng Zhao arrives at federal court in Seattle for sentencing on Tuesday, April 30, 2024.

Getty Images | Changpeng Zhao

Binance founder Changpeng Zhao was sentenced today to four months in prison after pleading guilty of failing to take effective measures against money laundering. The billionaire who formerly ran the world’s largest cryptocurrency exchange previously agreed to a plea deal that also required him to pay a $50 million fine.

The US government’s sentencing request asked for three years in prison. Zhao’s sentencing memorandum asked for probation without any prison time.

Forbes estimates Zhao’s net worth at $33 billion. He pleaded guilty to failure to maintain an effective anti-money laundering program.

Zhao’s cooperation with law enforcement was cited by US District Judge Richard Jones as a reason for imposing a significantly lower sentence than was requested by prosecutors, according to The Verge.

“Before handing down the sentence, Jones faulted Zhao for putting growth and profits before complying with US laws,” Reuters wrote. The sentencing hearing was in federal court in Seattle.

Jones was quoted as saying to Zhao that “you had the wherewithal, the finance capabilities, and the people power to make sure that every single regulation had to be complied with, and so you failed at that opportunity.”

US: Zhao willfully violated law

The government’s sentencing recommendation said that “Zhao’s willful violation of US law was no accident or oversight. He made a business decision that violating US law was the best way to attract users, build his company, and line his pockets.”

The US said Zhao bragged that if Binance complied with US law, it would not be “as big as we are today.”

“Despite knowing Binance was required to comply with US law, Zhao chose not to register the company with US regulators; he chose not to comply with fundamental US anti-money-laundering (AML) requirements; he chose not to implement and maintain an effective know-your-customer (KYC) system, which prevented effective transaction monitoring and allowed suspicious and criminal users to transact through Binance,” the US said.

Zhao also “directed Binance employees in a sophisticated scheme to disguise their customers’ locations in an effort to deceive regulators about Binance’s client base,” the US told the court.

Zhao’s sentencing memorandum denied criminal intent. “Generalized knowledge that the Company’s compliance program did not eliminate all risk of criminal activity does not mean that Mr. Zhao knew or intended for any funds to be criminally derived (he manifestly did not),” the filing said.

Zhao traveled to the US from his home in the United Arab Emirates to take responsibility, his legal team’s filing said. “He is a first-time, non-violent offender who committed an offense with no intention to harm anyone. He presents no risk of recidivism. He has appeared in this country voluntarily to accept responsibility,” the plea for lenience said.

Binance’s billionaire founder gets 4 months for violating money laundering law Read More »

health-care-giant-comes-clean-about-recent-hack-and-paid-ransom

Health care giant comes clean about recent hack and paid ransom

HEALTH CARE PROVIDER, HEAL THYSELF —

Ransomware attack on the $371 billion company hamstrung US prescription market.

Health care giant comes clean about recent hack and paid ransom

Getty Images

Change Healthcare, the health care services provider that recently experienced a ransomware attack that hamstrung the US prescription market for two weeks, was hacked through a compromised account that failed to use multifactor authentication, the company CEO told members of Congress.

The February 21 attack by a ransomware group using the names ALPHV or BlackCat took down a nationwide network Change Healthcare administers to allow healthcare providers to manage customer payments and insurance claims. With no easy way for pharmacies to calculate what costs were covered by insurance companies, payment processors, providers, and patients experienced long delays in filling prescriptions for medicines, many of which were lifesaving. Change Healthcare has also reported that hackers behind the attacks obtained personal health information for a “substantial portion” of the US population.

Standard defense not in place

Andrew Witty, CEO of Change Healthcare parent company UnitedHealth Group, said the breach started on February 12 when hackers somehow obtained an account password for a portal allowing remote access to employee desktop devices. The account, Witty admitted, failed to use multifactor authentication (MFA), a standard defense against password compromises that requires additional authentication in the form of a one-time password or physical security key.

“The portal did not have multi-factor authentication,” Witty wrote in comments submitted before his scheduled testimony on Wednesday to the House Energy and Commerce Committee’s Subcommittee on Oversight and Investigations. “Once the threat actor gained access, they moved laterally within the systems in more sophisticated ways and exfiltrated data.” Witty is also scheduled to appear at a separate Wednesday hearing before the Senate Committee on Finance.

Witty didn’t explain why the account, on a portal platform provided by software maker Citrix, wasn’t configured to use MFA. The failure is likely to be a major focus during Wednesday’s hearing.

After burrowing into the Change Healthcare network undetected for nine days, the attackers deployed ransomware that prevented the company from accessing its IT environment. In response, the company severed its connection to its data centers. The company spent the next two weeks rebuilding its entire IT infrastructure “from the ground up.” In the process, it replaced thousands of laptops, rotated credentials, and added new server capacity. By March 7, 99 percent of pre-incident pharmacies were once again able to process claims.

Witty also publicly confirmed that Change Healthcare paid a ransom, a practice that critics say incentivizes ransomware groups who often fail to make good on promises to destroy stolen data. According to communications uncovered by Dmitry Smilyanets, product management director at security firm Recorded Future, Change Healthcare paid $22 million to ALPHV. Principal members of the group then pocketed the funds rather than sharing it with an affiliate group that did the actual hacking, as spelled out in a pre-existing agreement. The affiliate group published some of the stolen data, largely validating a chief criticism of ransomware payments.

“As chief executive officer, the decision to pay a ransom was mine,” Witty wrote. “This was one of the hardest

decisions I’ve ever had to make. And I wouldn’t wish it on anyone.”

Bleeping Computer reported that Change Healthcare may have paid both ALPHV and the affiliate through a group calling itself RansomHub.

Two weeks ago, UnitedHealth Group reported the ransomware attack resulted in a $872 million cost in its first quarter. That amount included $593 million in direct response costs and $279 million in disruptions. Witty’s written testimony added that as of last Friday, his company had advanced more than $6.5 billion in accelerated payments and no-interest, no-fee loans to thousands of providers that were left financially struggling during the prolonged outage. UnitedHealth Care reported $99.8 billion in sales for the quarter. The company had an annual revenue of $371.6 billion in 2023.

Payment processing by Change Healthcare is currently about 86 percent of its pre-incident levels and will increase as the company further restores its systems, Witty said. The number of pharmacies it serves remains a “fraction of a percent” below pre-incident levels.

Health care giant comes clean about recent hack and paid ransom Read More »

researchers-make-a-plastic-that-includes-bacteria-that-can-digest-it

Researchers make a plastic that includes bacteria that can digest it

It’s alive! —

Bacterial spores strengthen the plastic, then revive to digest it in landfills.

Image of two containers of dirt, one with a degraded piece of plastic in it.

Han Sol Kim

One reason plastic waste persists in the environment is because there’s not much that can eat it. The chemical structure of most polymers is stable and different enough from existing food sources that bacteria didn’t have enzymes that could digest them. Evolution has started to change that situation, though, and a number of strains have been identified that can digest some common plastics.

An international team of researchers has decided to take advantage of those strains and bundle plastic-eating bacteria into the plastic. To keep them from eating it while it’s in use, the bacteria is mixed in as inactive spores that should (mostly—more on this below) only start digesting the plastic once it’s released into the environment. To get this to work, the researchers had to evolve a bacterial strain that could tolerate the manufacturing process. It turns out that the evolved bacteria made the plastic even stronger.

Bacteria meet plastics

Plastics are formed of polymers, long chains of identical molecules linked together by chemical bonds. While they can be broken down chemically, the process is often energy-intensive and doesn’t leave useful chemicals behind. One alternative is to get bacteria to do it for us. If they’ve got an enzyme that breaks the chemical bonds of a polymer, they can often use the resulting small molecules as an energy source.

The problem has been that the chemical linkages in the polymers are often distinct from the chemicals that living things have come across in the past, so enzymes that break down polymers have been rare. But, with dozens of years of exposure to plastics, that’s starting to change, and a number of plastic-eating bacterial strains have been discovered recently.

This breakdown process still requires that the bacteria and plastics find each other in the environment, though. So a team of researchers decided to put the bacteria in the plastic itself.

The plastic they worked with is called thermoplastic polyurethane (TPU), something you can find everywhere from bicycle inner tubes to the coating on your ethernet cables. Conveniently, there are already bacteria that have been identified that can break down TPU, including a species called Bacillus subtilis, a harmless soil bacterium that has also colonized our digestive tracts. B. subtilis also has a feature that makes it very useful for this work: It forms spores.

This feature handles one of the biggest problems with incorporating bacteria into materials: The materials often don’t provide an environment where living things can thrive. Spores, on the other hand, are used by bacteria to wait out otherwise intolerable conditions, and then return to normal growth when things improve. The idea behind the new work is that B. subtilis spores remain in suspended animation while the TPU is in use and then re-activate and digest it once it’s disposed of.

In practical terms, this works because spores only reactivate once nutritional conditions are sufficiently promising. An Ethernet cable or the inside of a bike tire is unlikely to see conditions that will wake the bacteria. But if that same TPU ends up in a landfill or even the side of the road, nutrients in the soil could trigger the spores to get to work digesting it.

The researchers’ initial problem was that the manufacturing of TPU products usually involves extruding the plastic at high temperatures, which are normally used to kill bacteria. In this case, they found that a typical manufacturing temperature (130° C) killed over 90 percent of the B. subtilis spores in just one minute.

So, they started out by exposing B. subtilis spores to lower temperatures and short periods of heat that were enough to kill most of the bacteria. The survivors were grown up, made to sporulate, and then exposed to a slightly longer period of heat or even higher temperatures. Over time, B. subtilis evolved the ability to tolerate a half hour of temperatures that would kill most of the original strain. The resulting strain was then incorporated into TPU, which was then formed into plastics through a normal extrusion process.

You might expect that putting a bunch of biological material into a plastic would weaken it. But the opposite turned out to be true, as various measures of its tensile strength showed that the spore-containing plastic was stronger than pure plastic. It turns out that the spores have a water-repelling surface that interacts strongly with the polymer strands in the plastic. The heat-resistant strain of bacteria repelled water even more strongly, and plastics made with these spores was tougher still.

To simulate landfilling or litter with the plastic, the researchers placed them in compost. Even without any bacteria, there were organisms present that could degrade it; by five months in the compost, plain TPU lost nearly half its mass. But with B. subtilis spores incorporated, the plastic lost 93 percent of its mass over the same time period.

This doesn’t mean our plastics problem is solved. Obviously, TPU breaks down relatively easily. There are lots of plastics that don’t break down significantly, and may not be compatible with incorporating bacterial spores. In addition, it’s possible that some TPU uses would expose the plastic to environments that would activate the spores—something like food handling or buried cabling. Still, it’s possible this new breakdown process can provide a solution in some cases, making it worth exploring further.

Nature Communications, 2024. DOI: 10.1038/s41467-024-47132-8  (About DOIs).

Listing image by Han Sol Kim

Researchers make a plastic that includes bacteria that can digest it Read More »

aws-s3-storage-bucket-with-unlucky-name-nearly-cost-developer-$1,300

AWS S3 storage bucket with unlucky name nearly cost developer $1,300

Not that kind of bucket list —

Amazon says it’s working on stopping others from “making your AWS bill explode.”

A blue bucket, held by red and yellow brackets, being continuously filled and overflowing

Enlarge / Be careful with the buckets you put out there for anybody to fill.

Getty Images

If you’re using Amazon Web Services and your S3 storage bucket can be reached from the open web, you’d do well not to pick a generic name for that space. Avoid “example,” skip “change_me,” don’t even go with “foo” or “bar.” Someone else with the same “change this later” thinking can cost you a MacBook’s worth of cash.

Ask Maciej Pocwierz, who just happened to pick an S3 name that “one of the popular open-source tools” used for its default backup configuration. After setting up the bucket for a client project, he checked his billing page and found nearly 100 million unauthorized attempts to create new files on his bucket (PUT requests) within one day. The bill was over $1,300 and counting.

Nothing, nothing, nothing, nothing, nothing … nearly 100 million unauthorized requests.

Nothing, nothing, nothing, nothing, nothing … nearly 100 million unauthorized requests.

“All this actually happened just a few days after I ensured my client that the price for AWS services will be negligible, like $20 at most for the entire month,” Pocwierz wrote over chat. “I explained the situation is very unusual but it definitely looked as if I didn’t know what I’m doing.”

Pocwierz declined to name the open source tool that inadvertently bum-rushed his S3 account. In a Medium post about the matter, he noted a different problem with an unlucky default backup. After turning on public writes, he watched as he collected more than 10GB of data in less than 30 seconds. Other people’s data, that is, and they had no idea that Pocwierz was collecting it.

Some of that data came from companies with customers, which is part of why Pocwierz is keeping the specifics under wraps. He wrote to Ars that he contacted some of the companies that either tried or successfully backed up their data to his bucket, and “they completely ignored me.” “So now instead of having this fixed, their data is still at risk,” Pocwierz writes. “My lesson is if I ever run a company, I will definitely have a bug bounty program, and I will treat such warnings seriously.”

As for Pocwierz’s accounts, both S3 and bank, it mostly ended well. An AWS representative reached out on LinkedIn and canceled his bill, he said, and was told that anybody can request refunds for excessive unauthorized requests. “But they didn’t explicitly say that they will necessarily approve it,” he wrote. He noted in his Medium post that AWS “emphasized that this was done as an exception.”

In response to Pocwierz’s story, Jeff Barr, chief evangelist for AWS at Amazon, tweeted that “We agree that customers should not have to pay for unauthorized requests that they did not initiate.” Barr added that Amazon would have more to share on how the company could prevent them “shortly.” AWS has a brief explainer and contact page on unexpected AWS charges.

The open source tool did change its default configuration after Pocwierz contacted them. Pocwierz suggested to AWS that it should restrict anyone else from creating a bucket name like his, but he had yet to hear back about it. He suggests in his blog post that, beyond random bad luck, adding a random suffix to your bucket name and explicitly specifying your AWS region can help avoid massive charges like the one he narrowly dodged.

AWS S3 storage bucket with unlucky name nearly cost developer $1,300 Read More »

mysterious-“gpt2-chatbot”-ai-model-appears-suddenly,-confuses-experts

Mysterious “gpt2-chatbot” AI model appears suddenly, confuses experts

Robot fortune teller hand and crystal ball

On Sunday, word began to spread on social media about a new mystery chatbot named “gpt2-chatbot” that appeared in the LMSYS Chatbot Arena. Some people speculate that it may be a secret test version of OpenAI’s upcoming GPT-4.5 or GPT-5 large language model (LLM). The paid version of ChatGPT is currently powered by GPT-4 Turbo.

Currently, the new model is only available for use through the Chatbot Arena website, although in a limited way. In the site’s “side-by-side” arena mode where users can purposely select the model, gpt2-chatbot has a rate limit of eight queries per day—dramatically limiting people’s ability to test it in detail.

So far, gpt2-chatbot has inspired plenty of rumors online, including that it could be the stealth launch of a test version of GPT-4.5 or even GPT-5—or perhaps a new version of 2019’s GPT-2 that has been trained using new techniques. We reached out to OpenAI for comment but did not receive a response by press time. On Monday evening, OpenAI CEO Sam Altman seemingly dropped a hint by tweeting, “i do have a soft spot for gpt2.”

A screenshot of the LMSYS Chatbot Arena

Enlarge / A screenshot of the LMSYS Chatbot Arena “side-by-side” page showing “gpt2-chatbot” listed among the models for testing. (Red highlight added by Ars Technica.)

Benj Edwards

Early reports of the model first appeared on 4chan, then spread to social media platforms like X, with hype following not far behind. “Not only does it seem to show incredible reasoning, but it also gets notoriously challenging AI questions right with a much more impressive tone,” wrote AI developer Pietro Schirano on X. Soon, threads on Reddit popped up claiming that the new model had amazing abilities that beat every other LLM on the Arena.

Intrigued by the rumors, we decided to try out the new model for ourselves but did not come away impressed. When asked about “Benj Edwards,” the model revealed a few mistakes and some awkward language compared to GPT-4 Turbo’s output. A request for five original dad jokes fell short. And the gpt2-chatbot did not decisively pass our “magenta” test. (“Would the color be called ‘magenta’ if the town of Magenta didn’t exist?”)

  • A gpt2-chatbot result for “Who is Benj Edwards?” on LMSYS Chatbot Arena. Mistakes and oddities highlighted in red.

    Benj Edwards

  • A gpt2-chatbot result for “Write 5 original dad jokes” on LMSYS Chatbot Arena.

    Benj Edwards

  • A gpt2-chatbot result for “Would the color be called ‘magenta’ if the town of Magenta didn’t exist?” on LMSYS Chatbot Arena.

    Benj Edwards

So, whatever it is, it’s probably not GPT-5. We’ve seen other people reach the same conclusion after further testing, saying that the new mystery chatbot doesn’t seem to represent a large capability leap beyond GPT-4. “Gpt2-chatbot is good. really good,” wrote HyperWrite CEO Matt Shumer on X. “But if this is gpt-4.5, I’m disappointed.”

Still, OpenAI’s fingerprints seem to be all over the new bot. “I think it may well be an OpenAI stealth preview of something,” AI researcher Simon Willison told Ars Technica. But what “gpt2” is exactly, he doesn’t know. After surveying online speculation, it seems that no one apart from its creator knows precisely what the model is, either.

Willison has uncovered the system prompt for the AI model, which claims it is based on GPT-4 and made by OpenAI. But as Willison noted in a tweet, that’s no guarantee of provenance because “the goal of a system prompt is to influence the model to behave in certain ways, not to give it truthful information about itself.”

Mysterious “gpt2-chatbot” AI model appears suddenly, confuses experts Read More »

apple-confirms-bug-that-is-keeping-some-iphone-alarms-from-sounding

Apple confirms bug that is keeping some iPhone alarms from sounding

do not be alarmed —

If your iPhone hasn’t been waking you up lately, you’re not alone.

iPhone in Standby mode

Enlarge / An iPhone in Standby mode, charging wirelessly on a desk.

Apple

If your iPhone’s alarm hasn’t woken you lately, it seems you’re not alone: Apple has confirmed to Today that a software bug is to blame, following user complaints on TikTok and other social platforms.

Apple is “aware of an issue causing some iPhone alarms to not play the expected sound,” according to the report and “is working on a fix.” The company’s official statement didn’t go into more detail on what caused the bug or why it seems to affect some users but not others.

These sorts of bugs usually relate to some kind of time change; one circa 2010 iOS alarm bug was caused by Daylight Saving Time, and another cropped up in the first two days of 2011 when alarms suddenly stopped working for the first two days of the year (for whatever reason. they began working properly again on January 3 without any kind of software update). Daylight Saving Time in 2024 kicked in all the way back in mid-March, so it’s hard to say whether the problem is related to the change this time around.

If you aren’t affected by the bug—my alarms have been working fine—you can still keep this bug in your pocket for when you’re late for something for another reason.

Apple confirms bug that is keeping some iPhone alarms from sounding Read More »

fragments-of-bird-flu-virus-genome-found-in-pasteurized-milk,-fda-says

Fragments of bird flu virus genome found in pasteurized milk, FDA says

Milk testing —

The test cannot tell if the virus is live. The FDA still assess milk supply as safe.

Cows being milked

Enlarge / Cows being milked

The Food and Drug Administration on Tuesday announced that genetic fragments from the highly-pathogenic avian influenza virus H5N1 have been detected in the pasteurized, commercial milk supply. However, the testing completed so far—using quantitative polymerase chain reaction (qPCR)—only detects the presence of viral genetic material and cannot tell whether the genetic material is from live and infectious viral particles or merely remnants of dead ones killed by the pasteurization process.

Testing is now ongoing to see if viable, infectious H5N1 can be identified in milk samples.

So far, the FDA still believes that the milk supply is safe. “To date, we have seen nothing that would change our assessment that the commercial milk supply is safe,” the agency said in a lengthy explanation of the finding and ongoing testing.

H5N1 made its startling jump to US dairy cows recently, with the first ever documented cases in a Texas herd confirmed on March 25. It has spread widely since then with at least 32 herds in eight states now known to be infected. The unexpected spread to bovines has raised fears that the virus is evolving to infect mammals more efficiently, and so poses a heightened risk of spread to and among humans.

But amid the alarming outbreak among the country’s dairy herds, federal agencies have appeared confident that the virus poses little risk to no risk to the safety of the milk supply.

“At this time, there continues to be no concern that this circumstance poses a risk to consumer health, or that it affects the safety of the interstate commercial milk supply because products are pasteurized before entering the market” the FDA wrote in an FAQ published Friday. “Pasteurization has continually proven to inactivate bacteria and viruses, like influenza, in milk.”

In the announcement Tuesday, the FDA also highlighted that multiple studies have shown that the pasteurization process for eggs, which uses lower temperatures than what is used for milk, is effective at inactivating H5N1.

Nevertheless, the FDA, along with the Centers for Disease Control and Prevention and the US Department of Agriculture, have continued to investigate potential risks, including establishing whether pasteurization can inactivate this specific virus. The FDA noted in its announcement Tuesday that, while pasteurization is expected to kill the virus, pasteurization is “different than complete sterilization.”

As such, it carried out the qPCR tests, expecting it might find some genetic fragments in the pasteurized milk because virus has been detected in raw milk. “Based on available information, pasteurization is likely to inactivate the virus, however the process is not expected to remove the presence of viral particles,” the FDA explained. “Therefore, some of the samples collected have indicated the presence of HPAI [Highly Pathogenic Avian Influenza] using quantitative polymerase chain reaction (qPCR) testing.”

The FDA did not indicate how many samples it has tested, where the samples were collected from, or the level of viral genetic material the samples contained.

The agency is now working on assessing whether it can identify if any virus particles are infectious using egg inoculation tests, which are considered a gold-standard for determining viral viability. It added that it will release results from those tests and others in “the next few days to weeks.”

“[W]e take this current situation and the safety of the milk supply very seriously. We recognize the importance of releasing further, actionable information,” the FDA said.

Meanwhile, the agency reported that the CDC’s food safety group has been closely monitoring emergency department data and flu testing data for any unusual trends in flu-like illness, flu, or conjunctivitis, which could indicate spread of H5N1 to people. “To date, surveillance systems do not show any unusual trends or activity,” the FDA said.

Fragments of bird flu virus genome found in pasteurized milk, FDA says Read More »

the-spam-came-from-inside-the-house:-how-a-smart-tv-can-choke-a-windows-pc

The spam came from inside the house: How a smart TV can choke a Windows PC

There are a million protocols in the naked city —

The curious case of a living room screen making Windows’ Settings app disappear.

Image of silhouetted girl trapped inside a television inside an entertainment center

Enlarge / I have hundreds of UUIDs and I must scream.

Getty Images

The modern “smart” TV asks a lot of us. In exchange for connecting you to a few streaming services you use, a TV will collect data, show ads, and serve as another vector for bad actors. In a few reported cases, though, a modern connected TV has been blamed for attacks not on privacy, eyeballs, or passwords but on an entirely different computer.

The TV in question is a Hisense TV, and the computer is a Windows PC, specifically one belonging to Priscilla Snow, a musician and audio designer in Montréal, Quebec. Her post about her Hisense experience reads like a mystery. Of course, because you already know the crime and the culprit, it’s more like a Columbo episode. Either way, it’s thrilling in a very specific I-can’t-believe-that-fixed-it kind of thrill.

Disappearing Settings, keyboards, remote desktops, and eventually taskbars

Snow’s Windows PC had “a few hiccups over the past couple of years,” Snow wrote on April 19. She couldn’t open display settings, for one. A MIDI keyboard interface stopped working. Task manager would start to hang until force-closed. Video capture cards had trouble connecting. As Snow notes, any veteran of a Windows computer that has had lots of stuff installed on it can mentally write off most of these things, or at least stash them away until the next reinstall.

Then, while trying to figure out why a remote desktop session wasn’t working, the task bars on Snow’s PC disappeared. The PC refused to launch any settings panels. After updating drivers and restarting the PC, the taskbars returned, but only for six days. Snow hunted for solutions, and after using “the exact right string in my search,” she found a Reddit thread that led to a Microsoft support question, all describing the same kinds of seemingly spectral problems her computer was having over time, with no clear cause.

User Narayan B wrote in Microsoft’s forum that the issue is the Hisense TV generating “random UUIDs for UPNP network discovery every few minutes.” Windows, seemingly not knowing why any device would routinely do this, sees and adds those alternate Hisense devices to its Device Association Framework, or DAF. This service being stuffed full of attention-grabbing devices can hang up Task Manager, Bluetooth, the Settings apps, File Explorer, and more.

The fix is deleting hundreds of keys from the registry. Narayan B wrote that noticed his Hisense TV flooding Windows’ device discovery systems before but “didn’t think Windows would go for a toss due to this.” Snow did the same, and everything—Task Manager, MIDI keyboard, remote desktop, even a CRT monitor she had assumed was broken—started working again.

UUID, UPNP, DAF, and hundreds of Registry keys

Along with deleting hundreds of keys with maniacal keyboard pounding, Snow notes in chats attached to her post that she disabled “Set up network connected devices automatically” on her “Private networks” settings in Windows. And, of course, she recommend not buying the same Hisense 50Q8G she bought, or at least not having it on the same network.

The mystery is solved, but the culprit remains very much at large. Or culprits—plural—depending on how you think a Windows PC should react to a shapeshifting TV.

Ars reached out to Hisense to ask for comment and will update the post if we hear back.

The spam came from inside the house: How a smart TV can choke a Windows PC Read More »